Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
171121_PDF.exe

Overview

General Information

Sample Name:171121_PDF.exe
Analysis ID:558240
MD5:60d8b8589ba8045361ae148ee76c7582
SHA1:328a778d026ad6611bb295bf3a799b6499fc7c7c
SHA256:8f34d0008f07a4460c9ebc5a8d8a558a85979bd0112962eddf9506dc5b627989
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected GuLoader
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Found stalling execution ending in API Sleep call
Tries to detect Any.run
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Abnormal high CPU Usage

Classification

  • System is w10x64
  • 171121_PDF.exe (PID: 6968 cmdline: "C:\Users\user\Desktop\171121_PDF.exe" MD5: 60D8B8589BA8045361AE148EE76C7582)
    • ieinstal.exe (PID: 5012 cmdline: "C:\Users\user\Desktop\171121_PDF.exe" MD5: DAD17AB737E680C47C8A44CBB95EE67E)
    • ieinstal.exe (PID: 7124 cmdline: "C:\Users\user\Desktop\171121_PDF.exe" MD5: DAD17AB737E680C47C8A44CBB95EE67E)
  • cleanup
{"Payload URL": "https://onedrive.live.com/downloa"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.543844211.0000000003200000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    0000000F.00000000.352935282.0000000003200000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000000.00000002.498027231.0000000002320000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        No Sigma rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 171121_PDF.exeAvira: detected
        Source: 0000000F.00000002.543844211.0000000003200000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/downloa"}
        Source: 171121_PDF.exeVirustotal: Detection: 60%Perma Link
        Source: 171121_PDF.exeMetadefender: Detection: 17%Perma Link
        Source: 171121_PDF.exeReversingLabs: Detection: 67%
        Source: 171121_PDF.exeJoe Sandbox ML: detected
        Source: 0.0.171121_PDF.exe.400000.0.unpackAvira: Label: TR/AD.Nekark.jinay
        Source: 171121_PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

        Networking

        barindex
        Source: Malware configuration extractorURLs: https://onedrive.live.com/downloa
        Source: unknownDNS traffic detected: queries for: onedrive.live.com

        System Summary

        barindex
        Source: initial sampleStatic PE information: Filename: 171121_PDF.exe
        Source: 171121_PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 171121_PDF.exe, 00000000.00000002.497741806.0000000000419000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBrugstyveriscortic.exe vs 171121_PDF.exe
        Source: 171121_PDF.exeBinary or memory string: OriginalFilenameBrugstyveriscortic.exe vs 171121_PDF.exe
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00405A7F
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0040721E
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00406A36
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00405395
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_023284F7
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02321A5F
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232FB8E
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232CFC2
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232330D
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232702D
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02327005
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E629
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E665
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D66F
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D698
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E6F9
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E6CD
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E734
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232272C
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D71E
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E76E
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D758
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02329784
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_023247F1
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02327463
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E59E
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E5EC
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232DA30
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02320A5C
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02324A41
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02324A81
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02324AE4
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02324B2E
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02324BB4
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232DBC5
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02324819
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E819
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D855
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E844
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D89D
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_023248DD
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D989
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D9D1
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232CFED
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02326FD9
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02324C32
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02321DBE
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03203760
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_032047F1
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320FB8E
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03201A5F
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320CFC2
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320330D
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320702D
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03207005
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320272C
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03203781
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03209784
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D698
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320E59E
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03207463
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03204B2E
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03204BB4
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03204A41
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03200A5C
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03204A81
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03204AE4
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03204819
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03203849
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_032048DD
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320CFED
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03206FD9
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03201DBE
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03204C32
        Source: 171121_PDF.exeStatic PE information: invalid certificate
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232F695 NtProtectVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232FB8E NtResumeThread,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232CFC2 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D210 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D295 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D2E0 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D311 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D046 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D0E6 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D0D1 NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232D13C NtAllocateVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02328A05 NtWriteVirtualMemory,
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232CFED NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320F695 NtProtectVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320CFC2 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D311 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D210 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D295 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D2E0 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D13C NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D046 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D0E6 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320D0D1 NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320CFED NtAllocateVirtualMemory,
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess Stats: CPU usage > 98%
        Source: 171121_PDF.exeVirustotal: Detection: 60%
        Source: 171121_PDF.exeMetadefender: Detection: 17%
        Source: 171121_PDF.exeReversingLabs: Detection: 67%
        Source: 171121_PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\171121_PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\171121_PDF.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: unknownProcess created: C:\Users\user\Desktop\171121_PDF.exe "C:\Users\user\Desktop\171121_PDF.exe"
        Source: C:\Users\user\Desktop\171121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\171121_PDF.exe"
        Source: C:\Users\user\Desktop\171121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\171121_PDF.exe"
        Source: C:\Users\user\Desktop\171121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\171121_PDF.exe"
        Source: C:\Users\user\Desktop\171121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\171121_PDF.exe"
        Source: C:\Users\user\Desktop\171121_PDF.exeFile created: C:\Users\user\AppData\Local\Temp\~DFD14B856B0CE15507.TMPJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/2@2/0

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 0000000F.00000002.543844211.0000000003200000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000000.352935282.0000000003200000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.498027231.0000000002320000.00000040.00000001.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00405241 pushfd ; retf
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00405A57 push 0000004Bh; retf
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00408858 push 00000018h; ret
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0040A864 push esi; iretd
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00405A7F push ebx; ret
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00406A27 push es; iretd
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00405AD4 push ebx; ret
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_00405CFE push 18FEA023h; retf
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_004086A1 push edx; iretd
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232816B push ss; iretd
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_023281D4 push ss; iretd
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232564B push ebp; iretd
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232A7C6 push ecx; ret
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02321834 push es; retf
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02322EF5 push ebp; iretd
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02320F16 push edx; ret
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_02322F48 pushad ; iretd
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320816B push ss; iretd
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320A7C6 push ecx; ret
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320564B push ebp; iretd
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03201834 push es; retf
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03200F16 push edx; ret
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03202F48 pushad ; iretd
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_03202EF5 push ebp; iretd
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Skuffejernenesco2Jump to behavior
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Skuffejernenesco2Jump to behavior
        Source: C:\Users\user\Desktop\171121_PDF.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeStalling execution: Execution stalls by calling Sleep
        Source: C:\Users\user\Desktop\171121_PDF.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\171121_PDF.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\qga\qga.exe
        Source: ieinstal.exe, 0000000F.00000002.544039436.0000000003690000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32PSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WIN64; X64) APPLEWEBKIT/537.36 (KHTML, LIKE GECKO) CHROME/91.0.4472.124 SAFARI/537.36SHELL32ADVAPI32TEMP=\VAGABO.EXE\CUSCONINESOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNSKUFFEJERNENESCO2
        Source: 171121_PDF.exe, 00000000.00000002.498410892.0000000003940000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32PSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WIN64; X64) APPLEWEBKIT/537.36 (KHTML, LIKE GECKO) CHROME/91.0.4472.124 SAFARI/537.36SHELL32ADVAPI32TEMP=PROGRAMFILES=\INTERNET EXPLORER\IEINSTAL.EXEWINDIR=\SYSWOW64\MSVBVM60.DLLPROGRAMFILES=\INTERNET EXPLORER\IEINSTAL.EXEWINDIR=\SYSWOW64\MSVBVM60.DLL
        Source: 171121_PDF.exe, 00000000.00000002.498410892.0000000003940000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544039436.0000000003690000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_023240AA rdtsc
        Source: C:\Users\user\Desktop\171121_PDF.exeSystem information queried: ModuleInformation
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
        Source: ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: vmicshutdown
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V Time Synchronization Service
        Source: ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: vmicvss
        Source: 171121_PDF.exe, 00000000.00000002.498410892.0000000003940000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544039436.0000000003690000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V Data Exchange Service
        Source: ieinstal.exe, 0000000F.00000002.544039436.0000000003690000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32psapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36shell32advapi32TEMP=\vagabo.exe\CUSCONINESoftware\Microsoft\Windows\CurrentVersion\RunSkuffejernenesco2
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V Heartbeat Service
        Source: 171121_PDF.exe, 00000000.00000002.498429562.0000000003A0A000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Service Interface
        Source: 171121_PDF.exe, 00000000.00000002.498410892.0000000003940000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32psapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36shell32advapi32TEMP=ProgramFiles=\internet explorer\ieinstal.exewindir=\syswow64\msvbvm60.dllProgramFiles=\internet explorer\ieinstal.exewindir=\syswow64\msvbvm60.dll
        Source: ieinstal.exe, 0000000F.00000002.544366173.0000000004F3A000.00000004.00000001.sdmpBinary or memory string: vmicheartbeat

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\171121_PDF.exeThread information set: HideFromDebugger
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_023296BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232E59E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232C982 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232BEA2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_032096BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320E59E mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320C982 mov eax, dword ptr fs:[00000030h]
        Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_0320BEA2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_023240AA rdtsc
        Source: C:\Users\user\Desktop\171121_PDF.exeCode function: 0_2_0232AB06 LdrInitializeThunk,

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\171121_PDF.exeMemory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 3200000
        Source: C:\Users\user\Desktop\171121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\171121_PDF.exe"
        Source: C:\Users\user\Desktop\171121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\171121_PDF.exe"
        Source: ieinstal.exe, 0000000F.00000002.544154942.0000000003AE0000.00000002.00020000.sdmpBinary or memory string: Program Manager
        Source: ieinstal.exe, 0000000F.00000002.544154942.0000000003AE0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: ieinstal.exe, 0000000F.00000002.544154942.0000000003AE0000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: ieinstal.exe, 0000000F.00000002.544154942.0000000003AE0000.00000002.00020000.sdmpBinary or memory string: Progmanlock

        Stealing of Sensitive Information

        barindex
        Source: Initial fileSignature Results: GuLoader behavior
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1
        Registry Run Keys / Startup Folder
        112
        Process Injection
        2
        Virtualization/Sandbox Evasion
        OS Credential Dumping311
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Registry Run Keys / Startup Folder
        1
        Software Packing
        LSASS Memory2
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Non-Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)112
        Process Injection
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
        Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        Obfuscated Files or Information
        NTDS2
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        171121_PDF.exe60%VirustotalBrowse
        171121_PDF.exe17%MetadefenderBrowse
        171121_PDF.exe68%ReversingLabsWin32.Trojan.Shelsy
        171121_PDF.exe100%AviraTR/AD.Nekark.jinay
        171121_PDF.exe100%Joe Sandbox ML
        No Antivirus matches
        SourceDetectionScannerLabelLinkDownload
        0.2.171121_PDF.exe.400000.0.unpack100%AviraHEUR/AGEN.1107800Download File
        0.0.171121_PDF.exe.400000.0.unpack100%AviraTR/AD.Nekark.jinayDownload File
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        onedrive.live.com
        unknown
        unknownfalse
          high
          d34m1w.bn.files.1drv.com
          unknown
          unknownfalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://onedrive.live.com/downloafalse
              high
              No contacted IP infos
              Joe Sandbox Version:34.0.0 Boulder Opal
              Analysis ID:558240
              Start date:23.01.2022
              Start time:06:42:50
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 5m 17s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:171121_PDF.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:26
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@5/2@2/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 8.4% (good quality ratio 4.3%)
              • Quality average: 24.5%
              • Quality standard deviation: 29.5%
              HCA Information:
              • Successful, ratio: 79%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
              • Excluded IPs from analysis (whitelisted): 23.211.4.86, 13.107.42.13, 13.107.42.12
              • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, fs.microsoft.com, bn-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, odc-bn-files-brs.onedrive.akadns.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, odc-bn-files-geo.onedrive.akadns.net, ris.api.iris.microsoft.com, l-0004.l-msedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              06:45:46AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Skuffejernenesco2 C:\Users\user\AppData\Local\Temp\CUSCONINE\vagabo.exe
              06:45:54AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Skuffejernenesco2 C:\Users\user\AppData\Local\Temp\CUSCONINE\vagabo.exe
              No context
              No context
              No context
              No context
              No context
              Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
              File Type:data
              Category:dropped
              Size (bytes):112464
              Entropy (8bit):6.100427719868403
              Encrypted:false
              SSDEEP:1536:9PtG0c3vhsblLAvTIpS1HP9CGZG48TdiwOeQqn4kFgGYglLg:61JsblLAvI+FW48QwOen4Hi8
              MD5:68F03A1A9EC55A9B943A015C091817D6
              SHA1:C952F771410E036D5C897EC956FFBB09291B167E
              SHA-256:75E5DC79753DA6494A68CF2F5E9101FB6433103DD3AA7D8BADCD23DDD2F5F651
              SHA-512:A9C5946EEF3B54BCAF23EB53CBBABA0B1BB6438A0A6DEC675F7F2E4AF7CA1CED7AF2737DB1079A68F9EBE1126D9338EE91436E847D57C9A5726759B4F8EA5C0C
              Malicious:false
              Reputation:low
              Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$..................._.................Rich...........................PE..L....~.N.................`...P...............p....@..........................................................................m..(........+..............P...................................................8... ....................................text...._.......`.................. ..`.data........p.......p..............@....rsrc....+.......0..................@..@..^............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\171121_PDF.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):16384
              Entropy (8bit):0.623084520004525
              Encrypted:false
              SSDEEP:12:rl3lKFQCb776fGZHbYS6TS63TXlYdl7HtllGXPuK9iUmTc:rbQylDVYdtNllG/uw7
              MD5:23BC92D1C5A3C3698C8524B7CEB3F5D9
              SHA1:199D2660FEA3F7310397A37A8C7C600E7A26D461
              SHA-256:5A6730EB0987730B214A46DC814FE2071576A338B2210DECE2780AC6E3B45DD7
              SHA-512:6FA7CAB689912B93C312D35E0E0F218E6138A3BCB8BC1B31CF0F80E4795C079F8589B879CCAC55C14262C710D4772A4067CCA4ED7890AED678EC988D113227DD
              Malicious:false
              Reputation:low
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.100488610521297
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.15%
              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:171121_PDF.exe
              File size:112464
              MD5:60d8b8589ba8045361ae148ee76c7582
              SHA1:328a778d026ad6611bb295bf3a799b6499fc7c7c
              SHA256:8f34d0008f07a4460c9ebc5a8d8a558a85979bd0112962eddf9506dc5b627989
              SHA512:6d7ab39a3367d72d70e0cf8af182fdf7b20100be1159465cebf5603c06bd485ffd0b5acee687ad029c1205c1cdadfbfe10002451b484cde1746ed2c8814f58e7
              SSDEEP:1536:OPtG0c3vhsblLAvTIpS1HP9CGZG48TdiwOeQqn4kFgGYglLg:X1JsblLAvI+FW48QwOen4Hi8
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................._.......................Rich............................PE..L....~.N.................`...P...............p....@
              Icon Hash:f2c2c29190d2c783
              Entrypoint:0x401194
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x4ED97EE6 [Sat Dec 3 01:44:06 2011 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:fca27436e553ec62bb2d0905390fd4e6
              Signature Valid:false
              Signature Issuer:E=Bibaciousnessmnten3@Pinjerforhaa.Non, CN=Vrdiheftesgalets, OU=Formationsskridt, O=ptychoptery, L=Retrickedtrbesk, S=Linoxininvectivel5, C=LV
              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
              Error Number:-2146762487
              Not Before, Not After
              • 11/16/2021 7:35:05 PM 11/16/2022 7:35:05 PM
              Subject Chain
              • E=Bibaciousnessmnten3@Pinjerforhaa.Non, CN=Vrdiheftesgalets, OU=Formationsskridt, O=ptychoptery, L=Retrickedtrbesk, S=Linoxininvectivel5, C=LV
              Version:3
              Thumbprint MD5:81C291A64F4EEAD3EB815B820975A11F
              Thumbprint SHA-1:3B9FB2B3310D80BB215D1F0A8A1B4C5CE397126F
              Thumbprint SHA-256:6E26EF48D70BCD9763606EA3E88539664649D7701B6F561892E318BB4DB04839
              Serial:00
              Instruction
              push 00401A0Ch
              call 00007F4FD4A94823h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              xor byte ptr [eax], al
              add byte ptr [eax], al
              inc eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [ecx+58h], al
              push FFFFFFBFh
              fadd st(0), st(7)
              int1
              dec edi
              movsb
              jmp 00007F4FD4A94840h
              sbb al, 8Eh
              scasd
              inc edx
              aas
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add dword ptr [eax], eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              loopne 00007F4FD4A947F8h
              or dword ptr [ebx], eax
              jnc 00007F4FD4A948A7h
              bound ebp, dword ptr [edi+72h]
              imul ebp, dword ptr fs:[esi+00h], 20004108h
              or byte ptr [ecx+00h], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              dec esp
              xor dword ptr [eax], eax
              add dword ptr [edi+ebx*8-316D0720h], ecx
              xor eax, 8026BB49h
              nop
              dec edx
              and eax, 87C64A41h
              out E9h, al
              cmpsd
              pop eax
              rol dword ptr [edi-7Dh], 1
              arpl word ptr [ebx+7Ah], dx
              arpl word ptr [edx], cx
              pop ss
              and byte ptr [edx], bh
              dec edi
              lodsd
              xor ebx, dword ptr [ecx-48EE309Ah]
              or al, 00h
              stosb
              add byte ptr [eax-2Dh], ah
              xchg eax, ebx
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              je 00007F4FD4A94835h
              add byte ptr [eax], al
              push ebx
              add eax, dword ptr [eax]
              add byte ptr [eax], al
              push cs
              add byte ptr [esi+4Fh], al
              inc esp
              inc ebp
              push edx
              inc ecx
              dec esp
              inc ebp
              push edx
              push ebx
              dec eax
              pop ecx
              inc esp
              push edx
              add byte ptr [42000701h], cl
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x16d140x28.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x190000x2bca.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x1b0000x750.rsrc
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2380x20
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x90.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x15ffc0x16000False0.495827414773data6.39269902756IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .data0x170000x17f80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x190000x2bca0x3000False0.236735026042data3.87641922123IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              SET0x197240x24a6MS Windows icon resource - 3 icons, 24x24, 16 colors, 4 bits/pixel, 24x24, 8 bits/pixelEnglishUnited States
              RT_ICON0x1943c0x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 4152326007, next used block 7370615
              RT_GROUP_ICON0x194280x14data
              RT_VERSION0x191400x2e8dataEnglishUnited States
              DLLImport
              MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, _adj_fdiv_m64, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, _adj_fdiv_m32i, _adj_fdivr_m32i, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarSetVar, __vbaLateMemCallLd, _CIatan, __vbaR8IntI4, _allmul, _CItan, _CIexp, __vbaFreeObj
              DescriptionData
              Translation0x0409 0x04b0
              LegalCopyrightART
              InternalNameBrugstyveriscortic
              FileVersion1.00
              CompanyNameART
              LegalTrademarksART
              CommentsART
              ProductNameART
              ProductVersion1.00
              FileDescriptionClassic ART
              OriginalFilenameBrugstyveriscortic.exe
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Jan 23, 2022 06:45:47.377051115 CET5510253192.168.2.38.8.8.8
              Jan 23, 2022 06:45:47.926724911 CET5623653192.168.2.38.8.8.8
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Jan 23, 2022 06:45:47.377051115 CET192.168.2.38.8.8.80x102aStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
              Jan 23, 2022 06:45:47.926724911 CET192.168.2.38.8.8.80x6b8cStandard query (0)d34m1w.bn.files.1drv.comA (IP address)IN (0x0001)
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Jan 23, 2022 06:45:47.424824953 CET8.8.8.8192.168.2.30x102aNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
              Jan 23, 2022 06:45:47.976964951 CET8.8.8.8192.168.2.30x6b8cNo error (0)d34m1w.bn.files.1drv.combn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
              Jan 23, 2022 06:45:47.976964951 CET8.8.8.8192.168.2.30x6b8cNo error (0)bn-files.fe.1drv.comodc-bn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

              Click to jump to process

              Start time:06:43:39
              Start date:23/01/2022
              Path:C:\Users\user\Desktop\171121_PDF.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\171121_PDF.exe"
              Imagebase:0x400000
              File size:112464 bytes
              MD5 hash:60D8B8589BA8045361AE148EE76C7582
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Visual Basic
              Yara matches:
              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.498027231.0000000002320000.00000040.00000001.sdmp, Author: Joe Security
              Reputation:low

              Start time:06:44:14
              Start date:23/01/2022
              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\171121_PDF.exe"
              Imagebase:0xdd0000
              File size:480256 bytes
              MD5 hash:DAD17AB737E680C47C8A44CBB95EE67E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Start time:06:44:15
              Start date:23/01/2022
              Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\171121_PDF.exe"
              Imagebase:0xdd0000
              File size:480256 bytes
              MD5 hash:DAD17AB737E680C47C8A44CBB95EE67E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000F.00000002.543844211.0000000003200000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000F.00000000.352935282.0000000003200000.00000040.00000001.sdmp, Author: Joe Security
              Reputation:moderate

              No disassembly